Award List

We propose to implement a novel countermeasure against the exploitation of integrated circuit hardware. The proposed countermeasure is applicable to both FPGAs and ASICs, increases design obfuscation ...

SBIRPhase I2010Office of the Secretary of DefenseDepartment of Defense

The activity of an OS kernel may be monitored dynamically in real time. As the kernel executes, the transition among the constituent components of the kernel will follow a predictable pattern represe ...

SBIRPhase I2007Office of the Secretary of DefenseDepartment of Defense

In an information warfare scenario, the enemy will deploy an attack that has never been seen before. This attack will completely debilitate both defensive and offensive software capabilities. We hav ...

SBIRPhase II2008Office of the Secretary of DefenseDepartment of Defense

CML proposes to extend its current work in dynamic kernel monitoring for attack recognition and mitigation. The focus of this proposal is on mitigating the effects of an attack on executing software ...

SBIRPhase I2009Office of the Secretary of DefenseDepartment of Defense

ABSTRACT: This project will investigate the feasibility of an integrated multilevel system for protecting space assets from system hardware and firmware exploitation. The overall strategy is to provi ...

ABSTRACT: The objective of this work is to demonstrate a prototype of an innovative method to protect military space microelectronics from unauthorized tampering. The method will employ the joint coo ...

ABSTRACT: This project will investigate the feasibility of a computing appliance which uses Temporal Virtualization to help ameliorate the effects of malicious software activity. Temporal Virtualizat ...